1.
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?
2.
With Regard to using an Antivirus scanner during a computer forensics investigation, You should:
3.
Windows identifies which application to open a file with by examining which of the following?
4.
You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?
5.
Which of the following is NOT a graphics file?
6.
When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.
7.
In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.
8.
When you carve an image, recovering the image depends on which of the following skills?
9.
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.
10.
While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?